Huawei Agile Controller. Agile Controller 1
|
|
- Tamsin Horn
- 6 years ago
- Views:
Transcription
1 Huawei Agile Controller Agile Controller 1
2 Agile Controller 1 Product Overview Agile Controller is the latest user- and application-based network resource auto control system offered by Huawei. Following the centralized control principle of software-defined networking (SDN), Agile Controller dynamically schedules network and security resources on the entire campus network, acting like the brain of the smart campus network. With Agile Controller, networks will be more agile for services. Deliver policies Service flow WAN/Internet Policy enforcement point HQ access: R&D/sales/ guests Product Characteristics Data Center Experience-centric Redefined Network Agile Controller Agile Controller , ERP, code... Branch access: R&D/sales/ guests WAN/Internet Internet: R&D/sales... Agile Controller shifts customers' attention from technologies, equipment, and connectivity to users, services, and user experience, and freed customers from laborious manual configuration by providing natural-language network planning and automatic deployment. Agile Controller applies the SDN's centralized control idea into campus networks. It can dynamically schedule and adjust network and security resources in the entire campus network to meet requirements of frequently moving users, offering free mobility. Agile Controller can flexibly adjust user rights, QoS policies, and security policies on the entire network. This dynamic policy adjustment greatly reduces the service provisioning or network expansion period, allowing networks to keep in pace with fast changing services. Using Agile Controller, customers no longer need to pay attention to differences of various devices. They can use the natural language to configure network policies and deliver the configurations to all network devices by one click on Agile Controller. User-based QoS scheduling ensures preferential forwarding of VIP users' services when network resources are insufficient, delivering good experience to VIP users.
3 Network-wide united security Agile Controller implements united security, replacing single single-point protection with network-wide protection. Agile Controller collects logs from network devices, security devices, and service systems, and employs Big Data analytics to discover potential attacks and threats that are difficult to detect through single-device protection. ecurity devices are virtualized into a security resource center. Traffic of users with certain characteristics is blocked or redirected to the security resource center to defend against attacks. Agile Controller provides comprehensive terminal security and desktop management functions, and has over 5000 predefined terminal security policies, ensuring terminal access security. Openness and Interoperability A fully programmable system enables transformation from hardware-defined networking to software-defined networking. Agile Controller provides various northbound and southbound interfaces and open APIs to make the forwarding plane and control plane programmable. It can interoperate with service systems of customers to improve end-to-end operation and maintenance efficiency, shorten new service provisioning time, and give customers a platform for innovation. Agile Controller is seamlessly interoperable with mainstream cloud platforms, including Huawei FusionSphere, VMware vsphere, Openstack, and Microsoft Hyper-v. The good interoperability makes Agile Controller an elastic, open platform integrating best practices of various fields, allowing customers to flexibly define their networks based on service requirements. Core Functionalities Unified admission control policy engine: provides scenario awareness capability based on 5W1H (who, when, where, what device, why access, how to access). The 5W1H scenario awareness realizes unified authentication for wired/wireless, and internal/external users, allowing for access from various terminals. Security-group-based authorization: provides centralized policy configuration and network-wide automatic policy deployment and status monitoring. In this way, the same policy is applied to a user regardless of the user location, delivering consistent service experience for mobile users. User-group-based QoS policy configuration: ensures preferential forwarding of VIP users' data traffic when network resources are insufficient, delivering good service experience for VIP users. Guest management throughout the whole life cycle: enables customers to define Portal login pages according to their own needs. The self-defined Portal login pages can be pushed to users based on terminal types and locations, to help improve the enterprise image and reduce workload on IT operation and maintenance. Terminal security compliance check: checks the system configuration, software list, antivirus software, and local redundant accounts on terminals, and monitors user behaviors such as use of peripherals, network connection, unauthorized access to the Internet, and use of software. Service orchestration: abstracts all security devices into a security resource center and redirects user traffic to the security resource center for processing. The service orchestration capability improves resource efficiency and enhances network security protection capabilities. Agile Controller 2
4 Agile Controller 3 Big Data analytics: collects logs on the entire network and analyzes correlation between security events to show security status and trends of the network. Correlation analysis and security association help customers quickly identify network risks so that they can take proactive defense measures to protect the network. Operating Environment Configuration Note: The service management server (SM & SC) runs the Access Control, Guest Management, Free Mobility, and Service Orchestration components. The united security server (SV & iradar) runs the United Security component. Networking Service Management Server (SM & SC) United Security Server (SV & iradar) CPU 2* hex-core processor, 2 GHz 2* hex-core processor, 2 GHz Memory 16 GB 32 GB to 64 GB Storage 600 GB 4 TB or higher Agile Controller can work as long as its physical servers and network devices have reachable routes to each other. It is usually deployed in a data center.
5 AR Branch network L2 SW AR Branch network L2 SW Internet access WAN/Internet Data Center Campus egress NGFW/SVN Agile Controller Agile core Agile aggregation Converged access Specifications Function Identity authentication Policy engine Network access control Guest management Terminal identification Free mobility LSW Description AP LSW LSW AP Internal account authentication LSW Windows active directory (AD) authentication Server NMS Third-party Lightweight Directory Access Protocol (LDAP) authentication Mobile certificate authentication Anonymous authentication: Administrators can configure anonymous authentication in specified zones, allowing users in this zone to be authenticated without entering a password. Multi-dimensional authentication policies based on different rules Different authorization policies for different locations, departments, device types, access time, and access modes Different web authentication pages pushed based on conditions such as terminal locations, device types, and SSIDs Security compliance check (including security assessment and system configuration check): rejects access from security-incompliant terminals to protect network resources Automatic isolation and one-click repair of security-incompliant terminals User-based access authorization to deny unauthorized access Self-service guest account creation and registration Guest account notification (web, , and SMS) APIs for guest account creation, deletion, and modification Customization of registration and authentication pages Identifying various terminals such as PCs, smart terminals (smartphones and tablet computers), IP phones, and network printers Identifying operating systems such as Windows, Linux, MAC OS, Android, IOS, and Windows Phone Multiple device identification modes, such as SNMP, User-Agent, DHCP, and MAC OUI Unified policy configuration and management Configuration of intra-group policies and authorization rules Agile Controller 4 Configuration of matrix policy templates
6 List of Specifications 功能 规格 Network-wide user group policy matrix Agile Controller 5 Free mobility Service orchestration Terminal security management Desktop management United security Maintainable reports System management Networking Automatic policy deployment for new devices Network-wide policy status monitoring Experience guarantee for VIP users Service orchestration resource management Service flow definition Service chain orchestration Service chain monitoring Security hardening: including static configuration check (antivirus software, patch, suspected processes, and authorized software) and dynamic auditing (port usage check, minimum service, peripheral connection check, ARP inspection, and traffic monitoring), identifying and fixing potential risks Office behavior management: including web access, media downloading, and non-office software installation Information leak prevention: including peripheral and mobile storage management, unauthorized external network access control, and program control Network protection: isolates traffic of guests, security-incompliant terminals, and security-compliant terminals to prevent attacks from terminals Patch management: one-stop automatic patch check and fix, patch deployment display on device and patch basis, association with Windows Server Update Services (WSUS) IP asset auto-discovery: automatically discovers unmanageable devices such as IP printers, IP phones, smartphones, cash registers, and barcode scanners Asset lifecycle management: helps enterprises prevent hardware and software assets and know about asset usages Bandwidth-conserving, high-speed software distribution through distributed storage and fast subnet forwarding of large-size files Remote desktop assistance Message announcement: pushes bulletin messages to specific users or departments and allows setting of bulletin validity period Security log collection from Huawei devices and third-party devices with standard interfaces, including Syslog, SNMP, FTP/SFTP, OPSEC, and ODBC interfaces Security event correlation analysis using predefined and user-defined correlation analysis policies Security event response: notifies administrators of security events quickly using s or SMS messages Security trends display: shows security status and trends in the complete network topology, top N risky assets, and severity of security threats Predefined report templates and security trend reports, such as online user information report User-defined reports or reports obtained from the security center System running status monitoring: provides alarms on server exceptions in dialog boxes or s Online client fault diagnosis and centralized client fault handling Remote data backup Centralized networking: applicable to networks with a small number of terminals and a clear network structure Distributed networking: applicable to networks with multiple branches or a large number of terminals
7 Ordering Information Description Quantity Remarks 1.1 Software Agile Controller Access Control Component 1 Optional, providing user access control function Agile Controller Terminal Count License for Access Control More Information Incremental Incremental of 200, 500, 1000, 2000, 5000, 10000, and Agile Controller Guest Management Component 1 Optional, providing full-lifecycle guest management Agile Controller Guest Account License Incremental Incremental of 200, 500, 1000, 2000, 5000, 10000, and Agile Controller Free Mobility Component 1 Optional, providing policy matrix and QoS policy deployment based on user groups Agile Controller Service Orchestration Component 1 Optional, redirecting user traffic to the security resource center for processing Agile Controller Terminal Security Management Component Agile Controller Terminal Account License for Terminal Security Management Agile Controller United Security Component 1 Agile Controller Event Count License for United Security 1 Incremental Incremental Optional, providing terminal security management functions including terminal health check, peripheral management, unauthorized external network access control, asset management, patch management, software distribution, and bulletin message management Incremental of 200, 500, 1000, 2000, 5000, 10000, and Optional, providing network-wide security event collection, correlation analysis, and security trend display Incremental of 500 EPS, 1000 EPS, 2500 EPS, and 5000 EPS EPS: Events Per Second 1.2 Hardware for centralized deployment (number of users 10000, number of logs 2500 EPS) Integrated service management server (SM & SC) 1 Used when number of users Integrated united security server (SV & iradar) 1 Used when number of logs 2500 EPS 1.3 Hardware for distributed deployment (number of users > 10000, number of logs > 2500 EPS) SM server Service Manager, managing SCs and sending real-time instructions to connected node to complete various services SC server Unlimited Service Controller, completing tasks such as user authentication, security policy delivery, and data reporting Database server Can be deployed independently for database redundancy Security View security trend management server, showing SV server iradar correlation analysis results and security status of the entire network iradar server Log collection and correlation analysis server It is recommended that you deploy a correlation analyzer iradar-ca server (CA) server when more than 15 correlation rules are Unlimited configured on the iradar server. An iradar-cm log collector can be deployed when a iradar-cm server branch has less than 2000 EPS logs, and an iradar server is recommended when the number of logs is larger than 2000 EPS. S2600T disk array External disk array, configured when HA redundancy configuration is selected for SV and iradar. For more information about Huawei Agile Controller, please visit Agile Controller 6
8 Copyright Huawei Technologies Co., Ltd All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademark Notice, HUAWEI, and are trademarks or registered trademarks of Huawei Technologies Co., Ltd. Other trademarks, product, service and company names mentioned are the property of their respective owners. General Disclaimer The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.
Huawei Agile Controller. Agile Controller
Huawei 1 1 Product Overview Product Features is the latest user-centric and application-based, automatic network resource control system developed by Huawei. This system is positioned as the "Smart Brain"
More informationCloudEngine 1800V Virtual Switch
CloudEngine 1800V Virtual Switch CloudEngine 1800V Virtual Switch Product Overview Huawei CloudEngine 1800V (CE1800V) is a distributed virtual switch designed for virtualized environments in cloud data
More informationCloud Managed Campus, Cloudifying Network Management. Huawei Cloud Managed Campus Solution
Cloud Managed Campus, Cloudifying Network Management Huawei Cloud Managed Campus Solution Traditional Network Management Failed to Satisfy NaaS Needs High Cost of Local Network Devices Lack of Network
More informationHuawei Agile Controller-Campus Datasheet
Huawei Agile Controller-Campus Datasheet The Agile Controller-Campus is a policy control system developed by Huawei for campus networks. It can centrally control user rights, quality of service (QoS),
More informationAlcatel-Lucent OmniVista 2500 Network Management System
Alcatel-Lucent OmniVista 2500 Network Management System The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides cohesive management and network-wide visibility, increasing IT efficiency
More informationCopyright Huawei Technologies Co., Ltd All rights reserved. Trademark Notice General Disclaimer
Copyright Huawei Technologies Co., Ltd. 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationHuawei SD-WAN Solution
Huawei SD-WAN Solution HUAWEI TECHNOLOGIES CO., LTD. 1 Trends and Challenges Faced by Enterprise Networks Enterprise IT architecture is continuously transforming towards the cloud architecture, and public
More informationHuawei Enterprise Network esight Channel Sales Guide HUAWEI TECHNOLOGIES CO., LTD. Issue 3.2. Date
Huawei Enterprise Network esight Channel Sales Guide Issue 3.2 Date 2013-11-20 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any
More informationHuawei Enterprise S2700 Series Switches
Huawei Enterprise S2700 Series Switches 2 Product Overview The S2700 series enterprise switches (S2700 for short) are next-generation energy-saving M Ethernet intelligent switches. The S2700 utilizes cutting-edge
More informationQuidway S2700 Series Enterprise Switches
Quidway S2700 Series Enterprise Switches Quidway S2700 Series Enterprise Switches Product Overview The Quidway S2700 enterprise switches (S2700 for short) are next-generation energy-saving 100M Ethernet
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationTayo Chief Solutions Manager (2013/09/07)
Agile Network Agile World Tayo Ashiru/tayo.ashiru@huawei.com Chief Solutions Manager (2013/09/07) Is Your Network Ready? Mobility Cloud Computing Big Data Social Network Internet of Things Application
More informationHuawei Sx7 Series Switches. SVF Technology White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 01 Date 2014-11-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationVirtualized Network Services SDN solution for service providers
Virtualized Network Services SDN solution for service providers Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise customers
More informationHuawei Enterprise S2700 Series Switches
2 Product Overview The S2700 series enterprise switches (S2700s) are next-generation energy-saving intelligent 100M Ethernet switches. The S2700 utilizes cutting-edge switching technologies and Huawei
More informationEnterprise Guest Access
Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of
More informationHUAWEI UMA Full Product Datasheet
HUAWEI UMA Full Product Datasheet HUAWEI UMA Brief Product Datasheet Product Overview HUAWEI Unified Maintenance Audit (UMA) system centrally manages, monitors, and audits operations of all operation and
More informationHuawei CloudFabric and OpenStack Cloud Platform Intergration Solution
Huawei CloudFabric and OpenStack Cloud Platform Intergration Solution Cloud Platform Interoperation Solution Interoperation with OpenStack ML2 DhcpRpc callback ML2-PlugIn DhcpAgent NotifyAPI Port Subnet
More informationAlcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service
Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service Alcatel-Lucent OmniVista Cirrus is a scalable, resilient, secure cloud-based network management for unified access
More informationVirtualized Network Services SDN solution for enterprises
Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations
More informationHuawei CloudFabric and VMware Collaboration Innovation Solution in Data Centers
Huawei CloudFabric and ware Collaboration Innovation Solution in Data Centers ware Data Center and Cloud Computing Solution Components Extend virtual computing to all applications Transform storage networks
More informationHPE Intelligent Management Center
HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM
More informationHuawei Agile Campus Network Solution
Huawei Agile Campus Network Solution HUAWEI TECHNOLOGIES CO., LTD. Bantian, Longgang District Shenzhen518129, P. R. China Tel:+86-755-28780808 HUAWEI TECHNOLOGIES CO., LTD. 01 Network Development Trends
More informationEnabling Agile Service Chaining with Service Based Routing
Enabling Agile Service Chaining with Service Based Routing Contents Abstract...1 1. Introduction...1 2. Huawei s SBR Solution for Agile Service Chaining...3 2.1. Architecture Overview...3 2.2. Multi-Dimensional
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased
More informationHuawei BYOD Network Solution
1 Trends of Enterprise Network 1 Under the circumstance of economic globalization, enterprises expand gradually and have branches distributed sparsely. It is a great challenge for enterprise staff, especially
More informationVMWARE AND NETROUNDS ACTIVE ASSURANCE SOLUTION FOR COMMUNICATIONS SERVICE PROVIDERS
SOLUTION OVERVIEW VMWARE AND NETROUNDS ACTIVE ASSURANCE SOLUTION FOR COMMUNICATIONS SERVICE PROVIDERS Combined solution provides end-to-end service and infrastructure visibility, service monitoring and
More informationHUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series
HUAWEI TECHNOLOGIES CO., LTD. Huawei 6000 series Huawei 6000 series can detect APT (Advanced Persistent Threat) attacks, which altogether exploit multiple techniques (including zero-day vulnerabilities
More informationWay to Implement SDN Network In Data Center
Way to Implement SDN Network In Data Center Cloud Computing Era Is Coming Cloud computing market has a bright prospect According to a report from Forrester Research, the global cloud computing market will
More informationA10 HARMONY CONTROLLER
DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for
More informationSecure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices
Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company
More informationRed Hat Cloud Suite 1.1
Red Hat Cloud Suite 1.1 Product Guide Overview of the Red Hat Cloud Suite Last Updated: 2018-12-14 Red Hat Cloud Suite 1.1 Product Guide Overview of the Red Hat Cloud Suite Red Hat Cloud Suite Documentation
More informationNetworks with Cisco NAC Appliance primarily benefit from:
Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,
More informationForeScout Agentless Visibility and Control
ForeScout Agentless Visibility and Control ForeScout Technologies has pioneered an agentless approach to network security that effectively helps address the challenges of endpoint visibility and control
More informationThe Fastest Scale-Out NAS
The Fastest Scale-Out NAS The features a symmetric distributed architecture that delivers superior performance, extensive scale-out capabilities, and a super-large single file system providing shared storage
More informationPowerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations
Powerful Insights with Every Click FixStream Agentless Infrastructure Auto-Discovery for Modern IT Operations The Challenge AIOps is a big shift from traditional ITOA platforms. ITOA was focused on data
More informationCisco Data Center Network Manager 5.1
Cisco Data Center Network Manager 5.1 Product Overview Modern data centers are becoming increasingly large and complex. New technology architectures such as cloud computing and virtualization are adding
More informationRed Hat Cloud Infrastructure 1.1
Red Hat Cloud Infrastructure 1.1 Product Guide Overview of the Red Hat Cloud Infrastructure Last Updated: 2018-12-14 Red Hat Cloud Infrastructure 1.1 Product Guide Overview of the Red Hat Cloud Infrastructure
More informationCisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1
Cisco ISE Overview, page 2 Key Functions, page 2 Identity-Based Network Access, page 2 Support for Multiple Deployment Scenarios, page 3 Support for UCS Hardware, page 3 Basic User Authentication and Authorization,
More informationDATA SHEET MODEL AXC1000 HIGHLIGHTS OVERVIEW. Redefining Enterprise Wireless Management
DATA SHEET Redefining Enterprise Wireless MODEL AXC1000 HIGHLIGHTS OVERVIEW TurboRF maximizes WLAN performance VisualSec - a comprehensive and visible security protection mechanism FlowPath - 1-7 layer
More informationCloud Sandboxing Against Advanced Persistent Attacks
CANTO 2017 Cloud Sandboxing Against Advanced Persistent Attacks Ric Leung Director of Product Management Huawei Technologies Co., Ltd. Traditional Defenses Are Ineffective Against Advanced Unknown Threats
More informationvrealize Operations Management Pack for NSX for vsphere 2.0
vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More informationCloud-Oriented Converged Storage
5600, and 500 V3 Storage Systems Cloud-Oriented Converged Storage 5600, and 500 V3 mid-range storage systems are next-generation unified storage products specifically designed for enterprise-class applications.
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.0 Revision B Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5
More informationSEL-5056 Software-Defined Network (SDN) Flow Controller
SEL-5056 Software-Defined Network (SDN) Flow Controller SDN Configuration, Orchestration, and Monitoring Software Major Features and Benefits The SEL-5056 SDN Flow Controller is enterprise software based
More information70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure
70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center
More informationSymantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure
Symantec Discovery Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure OVERVIEW Symantec Discovery helps ensure Client Resilience by identifying and
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationForescout. Configuration Guide. Version 2.4
Forescout Version 2.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationOne Net Campus Huawei Campus Network Solution
One Net Campus Huawei Campus Network Solution 2 引言 3 园区网面临的挑战 4 华为园区网解决方案介绍 6 华为园区网解决方案对应产品组合 6 结束语 Introduction campus network is an internal network of an enterprise or organization, which covers indoor
More informationOceanStor 5300F&5500F& 5600F&5800F V5 All-Flash Storage Systems
OceanStor 5300F&5500F& 5600F&5800F V5 Huawei mid-range all-flash storage systems (OceanStor F V5 mid-range storage for short) deliver the high performance, low latency, and high scalability that are required
More informationWorkspace. User Guide (Administrators) Date
Date 2018-11-12 Contents Contents 1 Introduction... 1 1.1 Concepts... 1 1.1.1...1 1.1.2 Software Client... 2 1.1.3 Mobile Terminal... 2 1.1.4 Infrastructure Server... 2 1.1.5 AD Management Server... 2
More informationForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3
ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.7 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.3 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5
More informationVMWARE VSPHERE FEATURE COMPARISON
DATASHEET VMWARE VSPHERE FEATURE COMPARISON ACROSS VERSIONS KEY SCALE METRICS: MAXIMUMS Host per Cluster VMs per Cluster CPUs per Host RAM per Host VMs per Host vcpus per VM vram per VM 32 64 64 4000 8000
More informationCisco Prime Home 5.1 Technical
Data Sheet Cisco Prime Home 5.1 Technical The proliferation of Internet-connected devices and the explosion of video and data traffic are driving complexity in the home network. Increasing numbers of new
More informationUDS Enterprise Preparing Templates Windows 7 + RDP + UDS Actor
Introduction This document shows how to configure a Windows 7 virtual machine to be used as a template with UDS Enterprise. During the procedure, we will show you the Windows 7 installation process, how
More informationCloud-Oriented Converged Storage
Cloud-Oriented Converged Storage 5600, and 5800 V3 mid-range storage systems are next-generation unified storage products specifically designed for enterprise-class applications. Employing a storage operating
More informationThe Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an
Solution Overview Cisco ACI and AlgoSec Solution: Enhanced Security Policy Visibility and Change, Risk, and Compliance Management With the integration of AlgoSec into the Cisco Application Centric Infrastructure
More informationForeScout Extended Module for Carbon Black
ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationThe Best Choice for SMBs
The Best Choice for SMBs Huawei OceanStor 2600 V3 storage system are flash-oriented storage products specifically designed for enterprise-class applications. Employing a storage operating system built
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationHP IMC Smart Connect Virtual Appliance Software
Data sheet HP IMC Smart Connect Virtual Appliance Software Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support with universal policies
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More informationWhite Paper. Huawei Campus Switches VXLAN Technology. White Paper
White Paper Huawei Campus Switches VXLAN Technology White Paper 1 Terms Abbreviation VXLAN NVo3 BUM VNI VM VTEP SDN Full English Name Virtual Extensible Local Area Network Network Virtualization over L3
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationForescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9
Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationForeScout CounterACT. Plugin. Configuration Guide. Version 2.1
ForeScout CounterACT Hybrid Cloud Module: VMware vsphere Plugin Version 2.1 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin...
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationMODERNIZE INFRASTRUCTURE
SOLUTION OVERVIEW MODERNIZE INFRASTRUCTURE Support Digital Evolution in the Multi-Cloud Era Agility and Innovation Are Top of Mind for IT As digital transformation gains momentum, it s making every business
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationOceanStor 6800F V5 Mission-Critical All-Flash Storage Systems
OceanStor 6800F V5 Mission-Critical s OceanStor 6800F V5 all-flash storage system (OceanStor 6800F V5 for short) is Huawei's next-generation mission-critical all-flash array. It has incorporated all of
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.8 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationRemote Operation Services
CHAPTER 7 Cisco Management Appliance Urban Security solutions require a mission-critical -centric network to be in place and functioning properly at all times. The network is made up of multiple pieces
More informationEnterprise Redefined, Mobility Your Way
Enterprise Redefined, Mobility Your Way Content 1 2 3 Fast-rising Enterprise Mobility Huawei Enterprise Mobility Solution Success Stories 1 Mobile working through BYOD are growing around world enterprise
More informationReviewer s guide. PureMessage for Windows/Exchange Product tour
Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the
More informationBrocade Network Advisor
DATA SHEET Brocade Network Advisor Highlights Automates tasks across the network to simplify management and reduce operating expenses Redefines storage management by monitoring both SCSI and NVMe storage
More informationCounterACT VMware vsphere Plugin
Configuration Guide Version 2.0.1 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin... 5 What to Do... 5 Requirements... 5 CounterACT
More informationSOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?
SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT When used
More informationSystrome Next Gen Firewalls
N E T K S Systrome Next Gen Firewalls Systrome s Next Generation Firewalls provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. The new next generation security
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationCisco NAC Network Module for Integrated Services Routers
Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco
More informationAlcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service
Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service Alcatel-Lucent OmniVista Cirrus is a scalable, resilient, secure cloud-based network management for unified access
More informationDPX19000 Next Generation Cloud-Ready Service Core Platform
DPX19000 Next Generation Cloud-Ready Service Core Platform Data Sheet DPtech DPX19000 Series Overview DPX19000 is a next generation cloud-ready service core platform self-developed by Hangzhou DPtech,
More informationDatacenter Security: Protection Beyond OS LifeCycle
Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000
More informationBest Practices of Huawei SAP HANA TDI Active-Passive DR Solution Using BCManager. Huawei Enterprise BG, IT Storage Solution Dept Version 1.
Best Practices of Huawei SAP HANA TDI Active-Passive DR Solution Using BCManager Huawei Enterprise BG, IT Storage Solution Dept 2017-8-20 Version 1.0 Contents 1 About This Document... 3 1.1 Overview...
More informationBetter Connected Hotel
Building a Better Connected Hotel Theodore Drimalas Datacom Solution Manager Challenges for Hospitality Wireless access experience Cost-effective network construction Simplified O&M Complex structures
More informationForescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9
Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationForeScout CounterACT. Configuration Guide. Version 5.0
ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More informationCloud Service Assurance for Virtualized Multiservice Data Center
Datasheet Reliable Data Center & Cloud Service Delivery Through Pre-Integrated Operations Overview The Cisco Virtualized Multiservice Data Center (VMDC) is a set of specifications and guidelines for creating
More informationDatasheet. Shenzhen TG-NET Botone Technology Co., Ltd. M-5 TG-NET Cloud Box. Datasheet
Datasheet M-5 TG-NET Cloud Box Datasheet Shenzhen TG-NET Botone Technology Co., Ltd. Address: Bldg.E3,Int l E-City,#1001 Zhongshanyuan Rd.,Nanshan District,Shenzhen, China Website: www.tg-net.net Tel:
More informationONUG SDN Federation/Operability
ONUG SDN Federation/Operability Orchestration A white paper from the ONUG SDN Federation/Operability Working Group May, 2016 Definition of Open Networking Open networking is a suite of interoperable software
More informationDPX17000 Deep Service Core Switch
DPX17000 Deep Service Core Switch Product Brochure DPX17000 series Overview DPX17000 series is a new generation deep service core switch self-developed by Hangzhou DPtech, Co., Ltd. Based on DPtech APP-X
More informationSecure wired and wireless networks with smart access control
Secure wired and wireless networks with smart access control Muhammad AbuGhalioun Senior Presales Consultant Hewlett-Packard Enterprise Aruba Saudi Arabia Managing risk in today s digital enterprise Increasingly
More informationHuawei AR1000V Brochure
Huawei AR1000V Brochure AR1000V Brochure AR1000V Brochure Huawei AR1000V is a virtual router based on Network Functions Virtualization (NFV). As a software product, the AR1000V uses the x86 server hardware
More information